China - hacker 'factory'
With just a few keystrokes, the nickname hacker Majia turned up the screen showing his latest victims.
With just a few keystrokes, the nickname hacker Majia turned up the screen showing his latest victims.
>>> Beautiful female hacker 'threatens' Google in China
' This is a list of people who have been infected with my Trojan worm ,' he said. ' They don't even know what's going on in their computers .'
Majia said the " trap " on the network he created last week lured more than 2,000 people in China and abroad - who clicked on places where the hacker pre-installed malicious code to infect. The spread of malicious code allowed him to control infected computers and steal bank account passwords.
The place to produce hackers
Majia is only part of a hacker community that exploits vulnerabilities in software to break into valuable data-stealing websites and sell them for money. Security experts say China has countless hackers like Majia. It is a force that has contributed to an increase in the number of cyberattacks stealing credit card information, sensitive business information and even launching cyber wars with hackers from other countries. In addition to independent hackers like Majia, according to security experts, in China there are ' patriotic ' hackers focusing their attacks on political objectives.
Three weeks ago, Google said hackers originating from China made a series of sophisticated attacks to steal the extremely valuable source code of the search firm. Indeed, in China as well as in some Eastern European and Russian countries, computer hacking has become a money-making movement and activity.
With nearly 6 USD, anyone can buy the book Guide to hacker entry. And with 380 million Internet users in China and the online game market growing very exciting, analysts say it is not surprising that Chinese youth are good at computer hacking.
Not only stealing credit card information and company data, many hackers made money by selling services to companies. Because it is difficult to trace network attacks, it is always a secret to discover who is behind the attacks and where hackers operate.
Hack is a job to make money
On condition of not disclosing his real name, Majia agreed two weeks ago to allow the New York Times (USA) reporter to witness hacking skills on a Chinese website. After a short time, the hacker recorded the ' hacked website' trophy on that website.
Majia said he began to love computer hacking as a first-year college student, after being instructed by his friends to break into computer systems. After obtaining an engineering degree, he earned a job in a state agency, largely thanks to his parents' relationship. But every night after work, he returned to his passion: hacking computers.
Computer hacking is a violation of law in China. Last year, China added a law to handle computer hacking crimes for up to 7 years in prison. But Majia did not seem to care about that rule because it was not strictly enforced and he was also careful not to leave a trace on his execution. According to Majia, the appeal of hacking is partly for money.
Scott J. Henderson, author of the book " Breaking into the Chinese hacker world" aside from stealing money from bank accounts, many hackers make money by stealing valuable information from businesses and going. Teach others how to break into computers.
' They make a lot of money selling viruses and Trojans to infect other people's computers ,' said Scott J. Henderson. ' Hackers also break into online game accounts and sell virtual characters. That activity brings a lot of money. '
You should read it
- Super hackers steal tens of millions of credit card data
- What hackers get when stealing credit card information?
- Malware can steal Facebook, Twitter and Gmail accounts
- BankBot is back on Play Store - an uninterrupted story about malware on Android
- 3 credit card security errors and How to secure credit card information
- 'Falling' before the culprit who hacked dozens of credit cards with a super algorithm developed by himself
- 7 steps to use a secure credit card online
- Some things to keep in mind when using credit cards
- Review the 'bad exploits' of bad Vietnamese hackers
- Top 10 most powerful black cards in the world
- The most basic insights to becoming a Hacker - Part 1
- Gun shot without puncturing Apple Card, new credit card from Apple
Maybe you are interested
What is RAM Disk? How does it work? How to File Contempt Charges Without a Lawyer Dunkleosteus: the 'destroyer' of the Devonian How to Transfer Property After the Death of a Parent Series of mysterious stone statues made scientists theorize: Did humans live at the same time as dinosaurs? How to Disable Automatic Reboot After Windows Update